Shared information distributing device, holding device, certificate authority device, and system

a certificate authority and information distributing technology, applied in the field of shared information distributing devices, holding devices, certificate authority devices, systems, etc., can solve the problems of malicious third parties using private keys in an unauthentic manner and spoofing certificates by malicious parties

Active Publication Date: 2010-09-16
PANASONIC CORP
View PDF7 Cites 50 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0017]With the above-described structure, the shared information distributing device assigns the first through the nth pieces of shared information respectively to the n holding devices, and distributes a pieces of shared information being different from the ith piece of shared information in ordinal position among n pieces of shared information, to each of the holding devices. This enables each holding device to hold one or more pieces of shared information which were distributed to other devices. This increases the redundancy of a same piece of shared information held by a plurality of holding devices, increasing the possibility of dealing with a case where the shared information held by any holding device was tampered with, destroyed, or made unusable.
[0018]In the above-stated shared information distributing device, the n holding devices have been associated with n nodes that have been virtually arranged to form one or more closed paths, and the second distribution unit distributes the first through the nth pieces of shared information to all the n holding devices so that at least the ith piece of shared information is distributed to an (i−1)th and an (i+1)th holding devices which have respectively been associated with an (i−1)th and an (i+1)th nodes that are adjacent, in a same closed path, to an ith node associated with the ith holding device to which the ith piece of shared information is distributed by the first distribution unit.
[0019]With the above-described structure, at least the ith piece of shared information is distributed to an (i−1)th and an (i+1)th holding devices which are adjacent, in a same closed path, to the ith holding device to which the ith piece of shared information is distributed. In handling, for example, a case where t...

Problems solved by technology

This is because if the private key is known to a malicious third party, the malicious th...

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shared information distributing device, holding device, certificate authority device, and system
  • Shared information distributing device, holding device, certificate authority device, and system
  • Shared information distributing device, holding device, certificate authority device, and system

Examples

Experimental program
Comparison scheme
Effect test

embodiment 1

1. Embodiment 1

[0148]1.1 Cryptographies Used in Present Embodiment

[0149]In the present embodiment, the RSA encryption method and the RSA signature method are used as the public key encryption method. In the following, the RSA encryption and the signature method are explained, respectively. In the following description, “X̂Y” represents X to the power of Yth, and “X mod Y” represents a remainder of X divided Y.

[0150]1.1.1 RSA Encryption Method

[0151](1) Generating Keys

[0152]In the RSA encryption method, the public key and the private key are calculated as follows.

[0153](Procedure 1-1) Select prime numbers p and q which are random in size, and obtain a product n by multiplying them, as represented by “n=pxq”. The size of p and q may be 512 bits, for example, and the size of n may be 1024 bits, for example.

[0154](Procedure 1-2) Calculate the lowest common multiple L of (p−1) and (q−1), as represented by “L=LCM(p−1,q−1)”.

[0155](Procedure 1-3) Select randomly a natural number e which is r...

specific example

[0674]FIG. 37 shows the shared information, and the first and second other device shared information held by each of the shared information holding devices 122-127 after the addition process.

[0675]For example, the shared information holding device 121 holds the shared information “D_1′”211c, the first other device shared information “D1_2′”212_1c, and the second other device shared information “D2_7′”217_1c, all having been updated in the addition process.

[0676]The following indicates that the private key “d” can be restored by using the shared information “D_1′” through “D_7” after the update.

D_1′+D_2′+D_3′+D_4′+D_5′+D_6′+D_7′=(D_1+d_6_1)+(D_2+d_6_2)+(D_3+d_6_3)+(D_4+d_6_4)+(D_5+d_6_5)+(d_6_6)+(D_7+d_6_7)=D_1+D_2+D_3+D_4+D_5+D_7+d_6_1+d_6_2+d_6_3+d_6_4+d_6_5+d_6_6+d_6_7=D_1+D_2+D_3+D_4+D_5+D_6+D_7=(d_1_1)+(d_2+d_1_2)+(d_3+d_1_3)+(d_4+d_1_4)+(d_5+d_1_5)+(d_6′+d_1_6)+(d_7+d_1_7)=d_2+d_3+d_4+d_5+d_6′+d_7+d_1_1+d_1_2+d_1_3+d_1_4+d_1_5+d_1_6+d_1_7=d_1′+d_2+d_3+d_4+d_5+d_6′+d_7=(d_1-m)+d...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A distributing device for generating private information correctly even if shared information is destroyed or tampered with. A shared information distributing device for use in a system for managing private information by a secret sharing method, including: segmenting unit that segments private information into a first through an nth pieces of shared information; first distribution unit that distributes the n pieces of shared information to n holding devices on a one-to-one basis; and second distribution unit that distributes the n pieces of shared information to the n holding devices so that each holding device holds an ith piece of shared information distributed by the first distribution unit, as well as a pieces of shared information being different from the ith piece of shared information in ordinal position among n pieces of shared information, “i” being an integer in a range from 1 to n.

Description

TECHNICAL FIELD[0001]The present invention relates to distribution and management of a plurality of pieces of information generated by segmentation of private information that is important information such as a private key, and to a technology for restoring the original private information by using the plurality of pieces of information.BACKGROUND ART[0002]In recent years, electronic commerce such as the net banking and the online shopping has been widely used in the Internet. In such electronic commerce, the public key based technology is used to prevent the transactions from being tampered with.[0003]The public key based technology prevents transactions from being tampered with by the structure where an authority called certificate authority issues a certificate (public key certificate) of a public key complying with the public key encryption, to online shopping sites and the like, and the users of the sites use the issued public key certificate. More specifically, the public key ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F12/02
CPCH04L9/085H04L9/0891H04L63/0823
Inventor MAEDA, MANABUNONAKA, MASAOFUTA, YUICHIYOKOTA, KAORUMATSUZAKI, NATSUMESHIZUYA, HIROKISAKAI, MASAOISOBE, SHUJIKOIZUMI, EISUKEHASEGAWA, SHINGOYOSHIDA, MASAKI
Owner PANASONIC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products